nShield HSMs also support a wide range of cryptographic algorithms, including elliptic-curve cryptography algorithms that deliver high-speed transactions ideally suited to today’s compact computing environments, as well as the industry’s most widely used operating systems and APIs.

The nShield Family comes in three convenient form factors:

nShield Connect

The Connect HSM is a network-attached appliance that delivers cryptographic services to applications distributed across the network.

nShield Connect HSMs are available in two series: classic nShield Connect+ HSMs and the high-performance nShield Connect XC HSM series.

nShield Solo

The Solo is a PCIe card for embedding in appliances or servers that delivers cryptographic services to applications hosted on a server or appliance.

nShield Solo HSMs are available in two series: classic nShield Solo+ HSMs and the high-performance nShield Solo XC HSM series.

nShield Edge

The Edge is a portable USB-based desktop device designed for convenience and economy. The Edge is ideal for developers as it supports applications such as low volume root key generation and offers an entry level security solution. The edge is also a perfect solution for off-line key generation for certificate authorities (CAs), low cost HSM development and Cloud Bring you Own Key (BYOK) environments.

nShield HSMs

nShield HSMs are deployed to give high assurance to a variety of business applications including BACS-TEL, SEPA, public key infrastructures (PKI), SSL/TLS encryption key protection, code signing, digital signing and blockchain.

As growth in the Internet of Things creates greater demand for device IDs and certificates, nShield HSMs will continue to support critical security measures such as device authentication using digital certificates.

Contact ID-3 to help you with the following nShield services:

HSM Implementation

Formal Key Ceremonies

CLOUD-FRIENDLY WEB SERVICE INTERFACES

The optional nShield Web Services Crypto API streamlines the interface between your applications and HSMs by executing commands through web service calls. This innovative approach facilitates deployments by removing the need to integrate applications directly with nShield, and eliminates dependencies on OS and architecture design choices. A cloud-friendly solution, the Web Services Crypto API interfaces with applications hosted in the cloud as well as in traditional data centers.

STRONGER KEY MANAGEMENT FOR YOUR CLOUD DATA WITH NSHIELD BYOK

nShield BYOK lets you generate strong keys in your on-premises nShield HSM and securely export them to your cloud applications, whether you use Amazon Web Services, Google Cloud Platform, Microsoft Azure— or all three. With nShield BYOK, you strengthen the security of your key management practices, gain greater control over your keys and ensure that you are sharing in the responsibility of keeping your data secure in the cloud.

nShield BYOK brings you the following benefits:
Safer key management practices that strengthen the security of your sensitive data in the cloud

SECURITY WORLD’S HIGHLY FLEXIBLE ARCHITECTURE

nShield HSMs are an integral part of the nCipher Security World architecture which creates a unique, flexible key management environment. With Security World, you can combine different nShield HSM models to build a unified ecosystem that delivers
scalability, seamless failover and load balancing.

Security World provides interoperability whether you deploy one or hundreds of HSMs, lets you manage an unlimited number of keys, and backs up and restores key material automatically and remotely.

A specialist supplier with industry experience can provide the assurance that you are speaking to the right person. We pride ourselves on being at hand to assist your delivery throughout its life-cycle. A single call to connect you to HSM expertise which you simply wont find at general re-sellers.

ID-3 Service Support

Unlike other re-sellers ID-3 is the UK’s only service led consultancy and re-seller who can offer comprehensive assistance for payShield 10k and its associated management tools to support your ITIL related service delivery.

ID-3 offers rapid over the phone or email advice and support to its customers from our team of in-house experts without depending on the vendors.

ID-3 has a proven track record of delivering HSMs into highly regulated environments and can offer an extensive range of professional service options and training options to help any team correctly implement the nShield in to any regulated environment.

ID-3 Documentation

Procedures are critical to every service. ID-3 HSM procedures are available to our customers via download from our portal and customised for your environment removing the arduous task of needing to become expert prior to business as usual handover and reducing the time it takes to get the service into production.

Full Suite B implementation with fully licensed ECC including Brainpool and custom curves

nShield HSMs offers support for the majority of these cryptographic algorithms as part of the standard feature set. For organizations wishing to use ECC or South Korean algorithms, optional activation licenses are needed.

All nShield hardware security modules integrate with the unique Security World architecture from nCipher. With this proven technology, you can combine different nShield HSM models to build a unified ecosystem that delivers scalability, seamless failover and load balancing.

Performance and versatility

With nShield hardware security modules, you only buy what you need to meet your specific performance requirements. nShield Connect and Solo are available in three models that offer varying levels of performance, including a wide range of ECC options that deliver industry-leading transaction rates.

Protect your proprietary applications and data

nShield Connect and Solo HSMs don’t just protect your sensitive keys and data; they also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within nShield boundaries, protecting your applications and the data they process.

Product Uses

Public Key Infrastructures

nShield HSMs generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases.